Call Number (LC) | Title | Results |
---|---|---|
QA76.9.A25 D78 2010 | Epidemics and rumours in complex networks / | 1 |
QA76.9.A25 D78 2010eb | Epidemics and Rumours in Complex Networks / | 1 |
QA76.9.A25 D8152 2008eb |
Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography / Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography / |
2 |
QA76.9.A25 D83 2009 | Eleventh hour security+ exam SYO-201 study guide / | 1 |
QA76.9.A25 .D86 2014 | CompTIA security+ (exam SY0-401) / | 1 |
QA76.9.A25 D86 2021 | Mike Meyers' CompTIA Security+ Certification Passport (Exam SY0-601) / | 1 |
QA76.9.A25 D87 2008eb | Cyber-security and threat politics : US efforts to secure the information age / | 2 |
QA76.9.A25 D87 2022 | Cyber security : issues and current trends / | 1 |
QA76.9.A25 E24 2023 | Data engineering with AWS : acquire the skills to design and build AWS-based data transformation pipelines like a pro / | 1 |
QA76.9.A25 E26 2013 | Economics of information security and privacy III | 1 |
QA76.9.A25E32 2002 | Secure XML : the New Syntax for Signatures and Encryption. | 1 |
QA76.9.A25 E325 2011 | Computer security fundamentals / | 1 |
QA76.9.A25 E33 2011 | Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, the Netherlands, February, 16-17, 2012 : proceedings / | 1 |
QA76.9.A25 E38 2001 | E-commerce security and privacy / | 1 |
QA76.9.A25 E385 2008eb | CISO leadership : essential principles for success / | 2 |
QA76.9.A25 E39 2002 | Informed watermarking / | 1 |
QA76.9.A25 E398 2017 | Guide to pairing-based cryptography / | 1 |
QA76.9.A25 E43 2007eb | Embedded Java security security for mobile devices / | 1 |
QA76.9.A25 E43 2009eb | Understanding and applying cryptography and data security / | 1 |
QA76.9.A25 E45 2013 | Malware, rootkits & botnets : a beginner's guide / | 1 |